23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Training Effectiveness Evaluation – <strong>Information</strong> collected to assist employees and their supervisors in<br />

assessing individual students’ subsequent on-the-job performance, to<br />

provide trend data to assist trainers in improving both learning and<br />

teaching, and to be used in return-on-investment statistics to enable<br />

responsible <strong>of</strong>ficials to allocate limited resources in a thoughtful,<br />

strategic manner among the spectrum <strong>of</strong> IT security awareness,<br />

security literacy, training, and education options for optimal results<br />

among the workforce as a whole.<br />

SOURCE: SP 800-16<br />

Tranquility – Property whereby the security level <strong>of</strong> an object cannot change while<br />

the object is being processed by an information system.<br />

SOURCE: CNSSI-4009<br />

Transmission – The state that exists when information is being electronically sent<br />

from one location to one or more other locations.<br />

SOURCE: CNSSI-4009<br />

Transmission <strong>Security</strong> –<br />

(TRANSEC)<br />

Measures (security controls) applied to transmissions in order to<br />

prevent interception, disruption <strong>of</strong> reception, communications<br />

deception, and/or derivation <strong>of</strong> intelligence by analysis <strong>of</strong><br />

transmission characteristics such as signal parameters or message<br />

externals.<br />

Note: TRANSEC is that field <strong>of</strong> COMSEC which deals with the security <strong>of</strong><br />

communication transmissions, rather than that <strong>of</strong> the information being<br />

communicated.<br />

SOURCE: CNSSI-4009<br />

Trap Door – 1. A means <strong>of</strong> reading cryptographically protected information by the<br />

use <strong>of</strong> private knowledge <strong>of</strong> weaknesses in the cryptographic<br />

algorithm used to protect the data.<br />

Transport Layer <strong>Security</strong> (TLS) –<br />

2. In cryptography, one-to-one function that is easy to compute in one<br />

direction, yet believed to be difficult to invert without special<br />

information.<br />

SOURCE: CNSSI-4009<br />

An authentication and security protocol widely implemented in<br />

browsers and Web servers.<br />

SOURCE: SP 800-63<br />

Triple DES – An implementation <strong>of</strong> the Data Encryption Standard (DES) algorithm<br />

that uses three passes <strong>of</strong> the DES algorithm instead <strong>of</strong> one as used in<br />

ordinary DES applications. Triple DES provides much stronger<br />

encryption than ordinary DES but it is less secure than AES.<br />

SOURCE: CNSSI-4009<br />

Pg 195

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!